{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:11:37Z","timestamp":1725761497973},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319038735"},{"type":"electronic","value":"9783319038742"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03874-2_12","type":"book-chapter","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T23:28:48Z","timestamp":1386113328000},"page":"114-123","source":"Crossref","is-referenced-by-count":2,"title":["Cloud Security and Privacy in the Light of the 2012 EU Data Protection Regulation"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Kronabeter","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Fenz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"The NIST Definition of Cloud Computing - SP 800-145, National Institute of Standards and Technology (2011), \n                  \n                    http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"12_CR2","unstructured":"Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), European Commission, \n                  \n                    http:\/\/ec.europa.eu\/justice\/data-protection\/document\/review2012\/com_2012_11_en.pdf"},{"key":"12_CR3","unstructured":"Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance (2011), \n                  \n                    https:\/\/cloudsecurityalliance.org\/guidance\/csaguide.v3.0.pdf"},{"key":"12_CR4","volume-title":"Cloud Computing: Web-basierte dynamische ITServices","author":"J. Nimis","year":"2011","unstructured":"Nimis, J., Tai, S., Baun, C., Kunzem, M.: Cloud Computing: Web-basierte dynamische ITServices. Springer, Heidelberg (2011)"},{"key":"12_CR5","unstructured":"Technology Research, Gartner Inc., \n                  \n                    http:\/\/www.gartner.com\/technology\/home.jsp"},{"key":"12_CR6","unstructured":"National Institute of Standards and Technology (NIST), \n                  \n                    http:\/\/www.nist.gov\/index.html"},{"key":"12_CR7","unstructured":"Cloud Security Alliance (CSA), \n                  \n                    https:\/\/cloudsecurityalliance.org\/"},{"key":"12_CR8","unstructured":"Securing Europe\u2018s Information Society (ENISA), \n                  \n                    http:\/\/www.enisa.europa.eu\/"},{"key":"12_CR9","unstructured":"Guidelines on Security and Privacy in Public Cloud Computing - SP 800-144, National Institute of Standards and Technology (2011), \n                  \n                    http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-144\/SP800-144.pdf"},{"key":"12_CR10","unstructured":"Commission proposes a comprehensive reform of the data protection rules, European Commission, \n                  \n                    http:\/\/ec.europa.eu\/justice\/newsroom\/data-protection\/news\/120125_en.htm"},{"key":"12_CR11","unstructured":"Australian Government (Department of Defense), Cloud Computing Security Considerations, \n                  \n                    http:\/\/www.dsd.gov.au\/infosec\/cloudsecurity.htm"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03874-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,24]],"date-time":"2019-05-24T22:56:58Z","timestamp":1558738618000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03874-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319038735","9783319038742"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03874-2_12","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}